US20050114709A1 - Demand based method for interdiction of unauthorized copying in a decentralized network - Google Patents
Demand based method for interdiction of unauthorized copying in a decentralized network Download PDFInfo
- Publication number
- US20050114709A1 US20050114709A1 US10/959,345 US95934504A US2005114709A1 US 20050114709 A1 US20050114709 A1 US 20050114709A1 US 95934504 A US95934504 A US 95934504A US 2005114709 A1 US2005114709 A1 US 2005114709A1
- Authority
- US
- United States
- Prior art keywords
- nodes
- interdiction
- decentralized network
- file
- protected file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
- H04L67/1063—Discovery through centralising entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
- H04L67/1068—Discovery involving direct consultation or announcement among potential requesting and potential source peers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1087—Peer-to-peer [P2P] networks using cross-functional networking aspects
- H04L67/1093—Some peer nodes performing special functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Definitions
- the present invention generally relates to copy protection techniques and in particular, to a demand based method for interdiction of unauthorized copying in a decentralized network.
- copyright owners seek other methods for protecting their copyrighted material, such as blocking, diverting or otherwise impairing the unauthorized distribution of their copyrighted works on a publicly accessible decentralized or P2P file trading network.
- P2P file trading network In order to preserve the legitimate expectations and rights of users of such a network, however, it is desirable that copyright owners do not alter, delete, or otherwise impair the integrity of any computer file or data lawfully residing on the computer of a file trader.
- Another object is to provide such method and apparatus so that the legitimate rights and expectations of users of the decentralized network are preserved.
- Still another object is to provide such method and apparatus such that the decentralized network is not prevented from operating for legitimate file sharing activities.
- Yet another object is to provide such method and apparatus so that copies of files on the decentralized network are not destroyed through erasure or corruption of data.
- one aspect is a method for interdicting unauthorized copying in a decentralized network, comprising: performing a first level of interdiction of unauthorized copying in a decentralized network having a plurality of nodes; detecting a trigger event associated with at least one of the plurality of nodes; and performing a second level of interdiction of unauthorized copying specifically directed to the at least one of the plurality of nodes.
- Another aspect is a method for interdicting unauthorized copying in a decentralized network, comprising: performing a first interdiction technique for interdicting unauthorized copying in a decentralized network having a plurality of nodes; detecting a trigger event related to one of the plurality of nodes while performing the first interdiction technique; and performing a second interdiction technique directed to the one of the plurality of nodes for interdicting unauthorized copying in response to the detection of the trigger event.
- Another aspect is an apparatus for interdicting unauthorized copying in a decentralized network, comprising at least one computer configured to: perform a first level of interdiction of unauthorized copying in a decentralized network having a plurality of nodes; detect a trigger event associated with at least one of the plurality of nodes; and perform a second level of interdiction of unauthorized copying specifically directed to the at least one of the plurality of nodes.
- Still another aspect is an apparatus for interdicting unauthorized copying in a decentralized network, comprising at least one computer configured to: perform a first interdiction technique for interdicting unauthorized copying in a decentralized network having a plurality of nodes; detect a trigger event related to one of the plurality of nodes while performing the first interdiction technique; and perform a second interdiction technique directed to the one of the plurality of nodes for interdicting unauthorized copying in response to the detection of the trigger event.
- FIG. 1 illustrates a node diagram of a non-hierarchical decentralized network.
- FIG. 2 illustrates a node diagram of a hierarchical decentralized network.
- FIG. 3 illustrates a flow diagram of a method for performing a search query in a non-hierarchical decentralized network.
- FIG. 4 illustrates a flow diagram of a method for performing a search query performed by a regular node in a hierarchical decentralized network.
- FIG. 5 illustrates a flow diagram of a method for performing a search query performed by a SuperNode in a hierarchical decentralized network.
- FIG. 6 illustrates a block diagram of a system utilizing aspects of the present invention for interdicting search queries in a decentralized network.
- FIG. 7 illustrates a flow diagram of a method for interdicting search queries through search result manipulation, utilizing aspects of the present invention.
- FIG. 8 illustrates a flow diagram of a method for quarantining a node, utilizing aspects of the present invention.
- FIGS. 9-12 illustrate nodal diagrams as an example of the method for quarantining a node, utilizing aspects of the present invention.
- FIG. 13 illustrates a flow diagram of a method for interdicting search queries through file impersonation, utilizing aspects of the present invention.
- FIG. 14 illustrates a flow diagram of a method for interdicting search queries through file transfer attenuation, utilizing aspects of the present invention.
- FIG. 15 illustrates a flow diagram of a demand based method for interdicting unauthorized copying in a decentralized network, utilizing aspects of the present invention.
- FIG. 16 illustrates a flow diagram of a preferred embodiment of a demand based method for interdicting unauthorized copying in a decentralized network, utilizing aspects of the present invention.
- FIG. 17 illustrates a block diagram of an apparatus for performing a demand based method for interdicting unauthorized copying in a decentralized network before connecting a controlled node, utilizing aspects of the present invention.
- FIG. 18 illustrates a block diagram of an apparatus for performing a demand based method for interdicting unauthorized copying in a decentralized network after connecting a controlled node, utilizing aspects of the present invention.
- a decentralized network there is no central authority or managing entity.
- Each node of the network makes decisions autonomously to connect, disconnect, and share information with other nodes in the network according to a predetermined protocol established by the creators of the network.
- Files and documents are stored in the nodes of the networks and propagated throughout the network via inter-nodal exchange. Users search the network using search queries at their respective nodes for specific files or documents and then select a host from search results to download or stream the content from.
- Type A and Type B networks are used as examples throughout the following description.
- FIG. 1 illustrates, as an example, a node diagram of a Type A, non-hierarchical decentralized network 100 .
- all nodes such as nodes N 11 ⁇ Nl 9 are treated as equals.
- FIG. 2 illustrates, as an example, a node diagram of a Type B, hierarchical decentralized network 200 .
- regular nodes such as nodes N 20 ⁇ N 28
- SuperNodes such as SuperNodes SN 0 ⁇ SN 2 .
- Regular nodes represent computers hooked to the network 200 that host or are capable of hosting files for sharing.
- SuperNodes are computers hooked to the network 200 that not only host or are capable of hosting files for sharing, but also have higher resources than regular nodes and generally perform functions in addition to those of regular nodes.
- FIG. 3 illustrates a flow diagram of a method for performing a file or document search in a Type A, non-hierarchical decentralized network such as the network 100 .
- a user of a node such as node N 10 in FIG. 1
- the node operated by the user hereinafter referred to as the “client node”
- receives and records that search string the name of a file that is being requested is hashed to get a key or hash value, and the key or hash value is sent out in the search string for matching.
- the client node then forwards the search string to other nodes in the decentralized network. It may do this, for example, by forwarding the search string to one or more of its neighboring nodes (i.e., nodes that it is in communication with through the decentralized network software, such as nodes N 11 , N 12 and N 13 with respect to node N 10 in FIG. 1 ), which in turn, forward the search string to their neighboring nodes (such as nodes N 14 , N 15 and N 16 with respect to node N 13 in FIG. 1 ), and so on, throughout the decentralized network.
- the precise behavior of the search string handling, forwarding and query match returning process depends on the defined rules and/or policies of the decentralized network.
- Each node receiving the search string checks its file list for matches, and sends information of any query matches back through the decentralized network so as to be received by the client node in 303 .
- Information of the query matches includes information on how to locate the file such as an URL.
- Hash values for each of the references i.e., files or documents
- All query matches are generally sent back along the path that they came.
- the client node receives a selection (i.e., file or document) indicated by its user, and in 306 , it manages a P2P transfer with the selected file's host node(s). For example, the client node may establish a direct connection with the node(s) having a copy of the selection available for download, and sends an HTTP request to those node(s) requesting the selection. The node(s) may then reply with a standard HTTP response.
- a selection i.e., file or document
- the client node may establish a direct connection with the node(s) having a copy of the selection available for download, and sends an HTTP request to those node(s) requesting the selection.
- the node(s) may then reply with a standard HTTP response.
- FIGS. 4-5 illustrate a flow diagram of a method for performing a search query in a Type B, hierarchical decentralized network such as the network 200 .
- FIG. 4 illustrates actions taken by a client node initiating the search string (such as node N 20 in FIG. 2 )
- FIG. 5 illustrates corresponding actions taken by a SuperNode (such as SuperNode SN 0 connected to node N 20 in FIG. 2 ) receiving the search string.
- a client node initiating the search string such as node N 20 in FIG. 2
- FIG. 5 illustrates corresponding actions taken by a SuperNode (such as SuperNode SN 0 connected to node N 20 in FIG. 2 ) receiving the search string.
- SuperNode such as SuperNode SN 0 connected to node N 20 in FIG. 2
- a user of a node (such as node N 20 ) initiates a search by generating a search (or keyword) string
- the node operated by the user i.e., the “client node”
- receives and records that search string i.e., the “client node”
- the client node then forwards the search string to a SuperNode (such as SN 0 ), which in turn, performs activities described in reference to FIG. 5 .
- the client node receives a prioritized list of matches back from the SuperNode and displays it on a display screen of the client node.
- the client node receives a selection indicated by its user, and in 405 , it manages a P2P transfer with the selected file's host node(s) in much the same fashion as described in reference to 305 of FIG. 3 .
- a SuperNode receives and records the search string from the client node.
- it checks the search string against its file list, which includes files that it hosts as well as files available on other nodes connected to it (such as regular nodes N 22 and N 21 connected to SuperNode SN 0 ) to generate a list of local matches.
- it forwards the search string to all or a subset of SuperNodes connected to it (such as SuperNodes SN 1 and SN 2 connected to SuperNode SN 0 ).
- These SuperNodes may in turn forward the search string to other SuperNodes connected to them, and so on, wherein the number of levels the search string is forwarded depends on the defined rules and/or policies of the decentralized network.
- Each of the SuperNodes receiving the search string then checks its file list for matches, and sends information of query matches (as lists of local matches) back through the decentralized network so as to be received by the original SuperNode in 504 .
- the original SuperNode i.e., the SuperNode first receiving the search string
- the prioritized list of matches is transmitted back to the client node from which the search string originated.
- decentralized networks may be found from publicly available information for decentralized peer-to-peer technologies and protocols such as Freenet, GNUtella, and Fastrack, wherein detailed knowledge of each such decentralized network is useful in implementing the various aspects of the present invention.
- FIG. 6 illustrates a block diagram of a system 600 for interdicting unauthorized copying in a Decentralized Network 604 .
- a plurality of Software Agents SA- 1 to SA-N are infiltrated into the Decentralized Network 604 masquerading as nodes by following all the traditions and policies of the Decentralized Network 604 so that they are virtually indistinguishable as infiltrators.
- the Software Agents SA- 1 to SA-N are implemented as software residing on one or more computers that communicate with nodes in the Decentralized Network 604 through individually assigned ports of the one or more computers. IP addresses for the ports may vary with time or in some other manner so that detection of the Software Agents SA- 1 to SA-N as unauthorized masqueraders of nodes in the Decentralized Network 604 and their expulsion from the Network 604 are prevented or at least made considerably more difficult.
- the Software Agents SA- 1 to SA-N may uniformly infiltrate the Decentralized Network 604 by, for example, each of the Software Agents SA- 1 to SA-N connecting to a corresponding node of a representative set of nodes in the Decentralized Network 604 .
- the representative set of nodes in this case is a subset of the Decentralized Network 604 from which characteristics of the entire Decentralized Network 604 may be statistically inferred.
- General steps used by the Software Agents SA- 1 to SA-N to infiltrate the Decentralized Network 604 include making Internet connections to other nodes in the Decentralized Network 604 , performing handshakes or login procedures with those other nodes as specified by the protocol of the Decentralized Network 604 in order to be recognized as nodes of the Decentralized Network 604 , and conducting searches and performing operations that regular nodes routinely do in the Decentralized Network 604 while clandestinely also performing interdiction functions.
- the Software Agents SA- 1 to SA-N are to masquerade as Supernodes in the Decentralized Network 604 , they also inform the Decentralized Network 604 that they are Supernodes upon logging in and/or they are configured or at least inform the Decentralized Network 604 that they are configured to meet all of the criteria for a Supernode according to the policies of the Decentralized Network 604 .
- nodes in the Decentralized Network 604 that the Software Agents SA- 1 to SA-N can make Internet connections to.
- One way to do this is for a node controlled by the interdicting system to first join the Decentralized Network 604 as a regular client by logging in through client application software provided by or otherwise associated with the Decentralized Network 604 , receiving addresses of nodes of the Decentralized Network 604 after logging in, and storing the addresses in a node address cache for later use.
- the node addresses may be provided in an initial list of node addresses received upon logging in, as well as additional node addresses resulting from connecting to one or more nodes in the initial list of nodes.
- the number of the Software Agents SA- 1 to SA-N, their attributes as reported to other nodes in the Decentralized Network 604 , and the geographical locations of the one or more computers upon which they reside are preferably determined by the number and geographical distribution of the nodes of the Decentralized Network 604 so that the Software Agents SA- 1 to SA-N receive a desired percentage of search related communications traveling through the Decentralized Network 604 .
- Each of the Software Agents SA- 1 to SA-N receives search queries from client nodes requesting files in the Decentralized Network 604 , and forwards those search queries to other nodes in the Decentralized Network 604 so as to behave just like a regular node in this respect.
- the Software Agents SA- 1 to SA-N receive search results back from those forwarded search queries, however, rather than passing those search results back along the same path that the Software Agents SA- 1 to SA-N received the corresponding search queries, they first send the search results to a Query Matcher 602 implemented as software residing on a computer connected to the Software Agents SA- 1 to SA-N through a private network.
- the Query Matcher 602 compares each of the references in the search results to entries in its own Database 603 containing metadata including content identification codes of protected files. Matches are then sent back to each of the Software Agents SA- 1 to SA-N for search results received by the Query Matcher 602 from that Software Agent.
- a Central Coordinating Authority 601 implemented as software on a computer coordinates activities of the plurality of Software Agents SA- 1 to SA-N so as to interdict unauthorized copying in the Decentralized Network 604 . It does this by sending instructions to the plurality of Software Agents SA- 1 to SA-N through a private network specifying actions to be taken when the plurality of Software Agents SA- 1 to SA-N receive matches of search results with protected files back from the Query Matcher 602 .
- FIG. 7 illustrates a flow diagram of a method for interdicting search queries through search result manipulation.
- a Software Agent infiltrates a decentralized network resembling or masquerading as a node along with other Software Agents as described in reference to FIG. 6 .
- the node may be any node in a non-hierarchical network, or it may be a SuperNode in a hierarchical network.
- the Software Agent captures search results on their way back to a client node from which its corresponding search string originated.
- the Software Agent identifies files, documents and/or programs that it has been chartered to protect (also referred to herein cumulatively as “protected files”) in the search results. For example, it may do this by sending the search results to a Query Matcher and receiving matches for protected files back from the Query Matcher as previously described in reference to FIG. 6 .
- the Software Agent modifies the search results so as to interdict unauthorized copying of the protected files according, for example, to instructions provided to it by a Central Coordinating Authority as previously described in reference to FIG. 6 .
- the Software Agent then forwards the modified search results through the decentralized network so that it is subsequently received by the client node which originated the corresponding search string.
- the Software Agent may employ any one or more of several techniques to modify the search results in 704 so as to interdict unauthorized copying in the decentralized network.
- these techniques a key feature is that none of the actual files that are residing on nodes in the decentralized network and being made available by those nodes for file sharing are damaged in any way.
- the techniques only interdict unauthorized copying of protected files in the decentralized network.
- One such technique to modify the search results in 704 is to simply delete all or a subset of the references that correspond to matches with protected files in the search results.
- Another technique to modify the search results in 704 is to modify information for the references corresponding to matches with protected files so that they point to, for examples, an IP address that is invalid, or an IP address for a computer that does not host the requested content, or an IP address for a computer that is not even running the client application software for the decentralized network.
- Another technique to modify the search results in 704 is to modify information for the references corresponding to matches with protected files so that they point to alternative files on their respective host nodes (i.e., nodes identified in the search results as having the protected files available for file sharing). Selection of the alternative files in this case may be made by random or non-random selection of non-protected files (i.e., files, documents or programs that the Software Agent is not chartered to protect).
- Another technique to modify the search results in 704 is to modify information for the references corresponding to matches with protected files so that they point to one or more alternative files residing on a Controlled Node. Selection of the alternative files may be made by random or non-random selection of files on a Controlled Node, as long as the alternative files being pointed to are not protected files.
- the Controlled Node may be a Software Agent or another node that is controlled by the Central Coordinating Authority 601 .
- the alternative file may be a synthesized decoy, or another file that is freely distributable, or a rights managed version of the protected file (i.e., one that has added controls and/or features to make it compatible with a digital rights management system).
- Decoys are used to impersonate protected files.
- Decoys are files having the same properties such as filename and metadata as the files that they are impersonating, but have different content.
- Hash values provided by the Decoys generally match their actual content, not the content of the files that they are impersonating. The following describes ways in which decoys can be algorithmically synthesized to impersonate protected audio, video, application, image and document files.
- the title of the synthesized decoy will be a random combinatorial reordering of words and phrases from the title of the protected file.
- the mouse over property of the file will be the same as the title.
- the content can be white noise or an anti-piracy message.
- the MIME type will be randomly selected from one of the commonly used types for audio (such as wave, or aiff).
- the length of the file is chosen at random from a range that corresponds to the size range of the known instances of the file on the Network.
- the content will be snow or white noise.
- the MIME type will be randomly selected from one of the commonly used types for video (such as mpeg, avi, or quicktime).
- the length of the file is also chosen at random from a range that corresponds to the size range of the known instances of the file on the Network.
- the content will be a “no operation” or NOP executable that simply terminates when executed.
- the type will be randomly selected from one of the commonly used types (such as ZIP).
- the content will be snow or an anti-piracy statement.
- the MIME type will be randomly selected from one of the commonly used types for images (such as jpg, tif, or gif).
- the color depth and resolution are also randomly chosen (e.g., 1600 ⁇ 800 resolution, 16 bit depth).
- the content is blank and the MIME type is randomly selected from one of the commonly used types for documents (such as zip, pdf, doc, ppt, rtf, or html).
- the algorithmically synthesized decoy for a protected audio file for Madonna's Ray of Life track could include a title Ray of Life Track by Madonna.
- the content of the file could be just white noise.
- the MIME type could be mp3 (or any of the common audio mime types) and the length of the audio file could be 3.5 minutes.
- Mouse over on the decoy would display the file title which would closely match the title of the protected file.
- the interdiction system of the present invention may also perform other activities for interdicting unauthorized copying in a decentralized network.
- nodal quarantining wherein a node to be quarantined is surrounded with Software Agents by, for example, the Central Control Authority 601 .
- nodal quarantining a node that is identified as having protected files available for file sharing can be effectively eliminated from the decentralized network by making it “invisible” to other nodes on the decentralized network or its file sharing activity restricted, but not completely eliminated, so as to interdict unauthorized copying of protected files while allowing it to share non-protected files with other nodes in the decentralized network.
- FIG. 8 illustrates a flow diagram of a method for quarantining a node
- FIGS. 9-12 illustrate a simple step-by-step example of the method using node diagrams.
- a list of its immediate neighbor nodes, N 1 and N 2 is obtained from that node ( FIG. 9 ).
- a Software Agent SA 1 is connected to a neighbor node N 1 and the node C ( FIG. 10 ).
- that neighbor node N 1 is then disconnected from the node C (left side of FIG. 11 ).
- the neighbor node N 1 may be disconnected using any one of numerous different techniques such as:
- the method determines whether there is a neighbor node that is still directly connected to the node to be quarantined. In this example, the answer is YES, so the method loops back to 802 , and another Software Agent SA 2 is connected to a neighbor node N 2 and the node C (right side of FIG. 11 ). In 803 , the neighbor node N 2 is then disconnected from the node to be quarantined ( FIG. 12 ). Then again in 804 , the method determines whether there is another neighbor node connected to the node to be quarantined. This time, however, the answer is NO, so the method terminates.
- FIG. 13 illustrates a flow diagram of a method for interdicting unauthorized copying in a decentralized network through file impersonation.
- a Software Agent infiltrates a decentralized network resembling or masquerading as a node along with other Software Agents as described in reference to FIG. 6 .
- the node in this case may be any type of node in either a non-hierarchical or hierarchical decentralized network.
- the Software Agent receives a search string just like other nodes in the decentralized network, and in 1303 , it reports matches for protected files satisfying the search string along with attributes that would qualify it as a top choice or source for the matches in the decentralized network.
- the Software Agent receives a request for one of the reported matches, and in 1305 , it sends an alternative file instead of the actually requested file.
- the alternative file in this case may be a synthesized decoy file, or a spoof file, or a file that is freely distributable, or a rights-managed version of the matched protected file.
- FIG. 14 illustrates a flow diagram of a method for interdicting unauthorized copying in a decentralized network through file transfer attenuation, wherein 1401 ⁇ 1404 are performed in the same manner as described in reference to 1301 ⁇ 1304 .
- the method attenuates the transmission so that its transmission rate starts off fast, then as the download goes on, the transmission rate slows down. By the time the transmission rate slows down a lot, the user of the client node requesting the file has got most of the file so he or she will be reluctant to cancel the download at that point.
- the transmission rate will slow down to such a trickle that the user will probably become extremely unhappy with the download progress and consequently, cancel it at that point. In this case, the download will not time out so the user must explicitly cancel it in order to terminate the transmission.
- the transmission may be automatically terminated after a certain percentage such as 95% of the file has been transmitted.
- hash spoofing Another technique for interdicting unauthorized copying in a decentralized network is hash spoofing. Although discussed separately here, forms of hash spoofing can also be used in the search results modification method described in reference to FIG. 7 as well as the file impersonation method described in reference to FIG. 13 .
- each unique file is given an identification code to uniquely identify its content.
- this code is a hash value generated through a cryptographic hash algorithm (such as MD-4, MD-5, SHA-1, SHA-64, etc.) of all or a subset of the file's content.
- This hash mechanism is used by some decentralized networks to facilitate resuming downloads which have been interrupted for some reason before completion, or for multi-source downloading which can be used to greatly improve the reliability and speed of file downloads.
- a client node sends out a search string on a decentralized network, and gets search results back along with their hashes.
- the file that the user of the client node wishes to download may reside on more than one node in the decentralized network as evidenced by identical hashes. If the client node has its download interrupted for some reason, it may resume its download at a later time by finding another node having the file as identified by an identical hash value, and downloading the rest of the file at that time from that node.
- the client node wants to download a file with many sources on the decentralized network and it knows that all of these sources have exactly the same content (as evidenced by their same hash values), the client node can split the file content into segments and request a few segments from each of the sources.
- the client node then can verify that the hash given to it in the search results is identical to the hash calculated using the file content that was downloaded. If the two match, then downloading was successful. On the other hand, if they do not match, then the downloaded file is said to be corrupt, and the client node will either automatically delete it or flag it as corrupt and ask the user what to do with it.
- Hash spoofing can be used for interdicting unauthorized copying where such interruption/resumption and multi-source downloading is being used in a decentralized network.
- the Software Agent may modify the search results so as to replace a link to (or address of) a file to be protected with either a link to a non-existent file along with a reported hash value that doesn't correspond to any file in the decentralized network, or a link to a spoof file along with a reported hash value matching that of the file whose link is being replaced.
- the client node will try to find the non-existent file, but will be unsuccessful, because the file doesn't exist.
- the client node may also try to find other files with the same hash value as the non-existent file for download, but will never be able to since there are no files in the decentralized network that correspond to the hash value.
- the Software Agent when the Software Agent receives a request for a protected file, or a segment of the protected file in the case of a multi-source download, the spoof file or a portion thereof is transmitted instead of the requested file or segment of the file.
- the client node After the client node has completed downloading the file, or all segments from its sources in the case of multi-source downloading, the hash will be calculated and a mismatch will be detected at that time (i.e., the file will be corrupted), because the hash value of the spoof file or segment thereof is different than that reported.
- interdiction methods described herein may be an inefficient use of system resources as well as commercially impractical from a cost/benefit perspective. Further, some interdiction methods may be most advantageous under certain situations, while other interdiction methods are most advantageous in others.
- one commonly used interdiction approach is to flood a decentralized network with decoys of a protected file.
- This approach may be very effective when there is a large demand for the protected file.
- it can also be wasteful of system resources when the demand for the protected file is small, since a large number of controlled nodes offering the decoys for downloading in the decentralized network must be provided in order to effectively flood the network with decoys, making this approach not easily scaleable.
- interdiction approaches described herein are readily scaleable, and therefore, are very cost effective even when demand for a protected file is small. These approaches are especially useful for protecting large catalogues of protected files where demand for individual files may vary considerably from one to another in the catalogue.
- a multi-level and/or demand based approach of using one or more interdiction techniques under certain circumstances, and other interdiction techniques under other circumstances can be readily appreciated for its usefulness in cost effectively interdicting unauthorized copying of protected files in a decentralized network.
- FIG. 15 illustrates, as an example, a general approach to a multi-level and/or demand based method for interdicting unauthorized copying in a decentralized network.
- a first level of interdiction is performed to interdict unauthorized copying of protected files in a decentralized network.
- a trigger event is detected while performing the first level of interdiction.
- the trigger event may be related to a number of search results being sent back to one of the decentralized network nodes indicating a file that is to be protected through the first level of interdiction, or a number of search queries originating from the node indicating a file that is to be protected through the first level of interdiction.
- a second level of interdiction is performed in response to the detection of the trigger event.
- the second level of interdiction may include tasks performed in addition to those of the first level of interdiction, or tasks performed in lieu of those performed in the first level of interdiction. Although only two levels of interdiction are shown in this particular example, it is to be appreciated that additional levels of interdiction could be added with each additional level being triggered by a different trigger event.
- FIG. 16 illustrates, as an example, a particular and preferred multi-level and/or demand based method for interdicting unauthorized copying in a decentralized network.
- a Filterer module is run along with or as a part of a software agent masquerading as a node in the decentralized network so as to perform search result manipulation such as described in reference to FIG. 7 .
- a trigger event is detected by the software agent while performing the search result manipulation.
- the trigger event in this case is related to a number of times a protected file is referenced in search results being transmitted back to one of the nodes of the decentralized network. More particularly, the trigger event is detected when that number exceeds a threshold number programmed into or provided to the software agent.
- a Flooder module included with or in the software agent is activated that causes the node identified in 1602 to be flooded with decoys of the protected file. Note that this is a selective flooding directed to a specific node of the decentralized network, as opposed to conventional flooding that is directed to the entire decentralized network. Because it is a selective or targeted flooding, as opposed to a shotgun flooding, it is to be appreciated that it is a far more efficient interdiction approach with respect to the utilization of system resources.
- FIGS. 17 and 18 illustrate, as an example, the operation of 1601 ⁇ 1603 in a hierarchical decentralized network.
- a Software Agent “SNF” performs the task of a filterer such as described in reference to 1601 , while masquerading as a SuperNode in the decentralized network so as to intercept communications within the decentralized network related to search queries.
- the Software Agent “SNF” identifies references to protected files in the communications by interacting with a Query Matcher 602 as described in reference to FIG. 6 .
- a trigger event is detected by the Software Agent “SNF”.
- SNF Software Agent
- a Flooder module included with or in the Software Agent “SNF” is activated.
- the Flooder module floods the identified SuperNode “SN 1 ” with decoys of the protected file by, for example, connecting one or more controlled nodes, such as Controlled Node “CN 4 ”, as regular nodes to the SuperNode “SN 1 ”, wherein each of the controlled nodes has one or more decoys of the protected file available for downloading.
- controlled nodes such as Controlled Node “CN 4 ”
- each of the controlled nodes has one or more decoys of the protected file available for downloading.
- the Software Agent “SNF” can selectively flood any SuperNode in the decentralized network with decoys of any protected file in a catalog of protected files after a trigger event has identified that SuperNode and that protected file as needing the additional protection afforded by such selective flooding.
- a reverse procedure may also be used wherein selective flooding is stopped when the trigger event is no longer being triggered (i.e., when the number of times that a reference identifying the protected file and included in communications associated with a given SuperNode falls below the threshold number).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
Description
- This application is a continuation-in-part to U.S. application Ser. No. 10/803,784 filed Mar. 18, 2004, 2004, which claims priority to U.S. provisional application Ser. No. 60/514,429 filed Oct. 25, 2003, U.S. provisional application Ser. No. 60/514,430 filed Oct. 25, 2003, U.S. provisional application Ser. No. 60/518,691 filed Nov. 10, 2003, and U.S. provisional application Ser. No. 60/528,466 filed Dec. 10, 2003.
- The present invention generally relates to copy protection techniques and in particular, to a demand based method for interdiction of unauthorized copying in a decentralized network.
- Unauthorized copying in decentralized networks using peer-to-peer (P2P) file sharing has become a major concern to owners of copyrighted material. Unlike a centralized network, decentralization makes it commercially impractical to pursue all copyright violators in court. This is because decentralization requires filing lawsuits against virtually millions of client computer operators instead of only one party operating a central computer.
- Accordingly, copyright owners seek other methods for protecting their copyrighted material, such as blocking, diverting or otherwise impairing the unauthorized distribution of their copyrighted works on a publicly accessible decentralized or P2P file trading network. In order to preserve the legitimate expectations and rights of users of such a network, however, it is desirable that copyright owners do not alter, delete, or otherwise impair the integrity of any computer file or data lawfully residing on the computer of a file trader.
- Accordingly, it is an object of the present invention to provide a method and apparatus for interdiction of unauthorized copying in decentralized networks.
- Another object is to provide such method and apparatus so that the legitimate rights and expectations of users of the decentralized network are preserved.
- Still another object is to provide such method and apparatus such that the decentralized network is not prevented from operating for legitimate file sharing activities.
- Yet another object is to provide such method and apparatus so that copies of files on the decentralized network are not destroyed through erasure or corruption of data.
- These and additional objects are accomplished by the various aspects of the present invention, wherein briefly stated, one aspect is a method for interdicting unauthorized copying in a decentralized network, comprising: performing a first level of interdiction of unauthorized copying in a decentralized network having a plurality of nodes; detecting a trigger event associated with at least one of the plurality of nodes; and performing a second level of interdiction of unauthorized copying specifically directed to the at least one of the plurality of nodes.
- Another aspect is a method for interdicting unauthorized copying in a decentralized network, comprising: performing a first interdiction technique for interdicting unauthorized copying in a decentralized network having a plurality of nodes; detecting a trigger event related to one of the plurality of nodes while performing the first interdiction technique; and performing a second interdiction technique directed to the one of the plurality of nodes for interdicting unauthorized copying in response to the detection of the trigger event.
- Another aspect is an apparatus for interdicting unauthorized copying in a decentralized network, comprising at least one computer configured to: perform a first level of interdiction of unauthorized copying in a decentralized network having a plurality of nodes; detect a trigger event associated with at least one of the plurality of nodes; and perform a second level of interdiction of unauthorized copying specifically directed to the at least one of the plurality of nodes.
- Still another aspect is an apparatus for interdicting unauthorized copying in a decentralized network, comprising at least one computer configured to: perform a first interdiction technique for interdicting unauthorized copying in a decentralized network having a plurality of nodes; detect a trigger event related to one of the plurality of nodes while performing the first interdiction technique; and perform a second interdiction technique directed to the one of the plurality of nodes for interdicting unauthorized copying in response to the detection of the trigger event.
- Additional objects, features and advantages of the various aspects of the present invention will become apparent from the following description of its preferred embodiment, which description should be taken in conjunction with the accompanying drawings.
-
FIG. 1 illustrates a node diagram of a non-hierarchical decentralized network. -
FIG. 2 illustrates a node diagram of a hierarchical decentralized network. -
FIG. 3 illustrates a flow diagram of a method for performing a search query in a non-hierarchical decentralized network. -
FIG. 4 illustrates a flow diagram of a method for performing a search query performed by a regular node in a hierarchical decentralized network. -
FIG. 5 illustrates a flow diagram of a method for performing a search query performed by a SuperNode in a hierarchical decentralized network. -
FIG. 6 illustrates a block diagram of a system utilizing aspects of the present invention for interdicting search queries in a decentralized network. -
FIG. 7 illustrates a flow diagram of a method for interdicting search queries through search result manipulation, utilizing aspects of the present invention. -
FIG. 8 illustrates a flow diagram of a method for quarantining a node, utilizing aspects of the present invention. -
FIGS. 9-12 illustrate nodal diagrams as an example of the method for quarantining a node, utilizing aspects of the present invention. -
FIG. 13 illustrates a flow diagram of a method for interdicting search queries through file impersonation, utilizing aspects of the present invention. -
FIG. 14 illustrates a flow diagram of a method for interdicting search queries through file transfer attenuation, utilizing aspects of the present invention. -
FIG. 15 illustrates a flow diagram of a demand based method for interdicting unauthorized copying in a decentralized network, utilizing aspects of the present invention. -
FIG. 16 illustrates a flow diagram of a preferred embodiment of a demand based method for interdicting unauthorized copying in a decentralized network, utilizing aspects of the present invention. -
FIG. 17 illustrates a block diagram of an apparatus for performing a demand based method for interdicting unauthorized copying in a decentralized network before connecting a controlled node, utilizing aspects of the present invention. -
FIG. 18 illustrates a block diagram of an apparatus for performing a demand based method for interdicting unauthorized copying in a decentralized network after connecting a controlled node, utilizing aspects of the present invention. - In a decentralized network, there is no central authority or managing entity. Each node of the network makes decisions autonomously to connect, disconnect, and share information with other nodes in the network according to a predetermined protocol established by the creators of the network. Files and documents are stored in the nodes of the networks and propagated throughout the network via inter-nodal exchange. Users search the network using search queries at their respective nodes for specific files or documents and then select a host from search results to download or stream the content from.
- To prevent downloading of protected files, various methods for search result manipulation and interdiction are described herein. These methods vary to some extent by the type of file sharing network that they are operating in. To illustrate the various aspects of the present invention, two networks, respectively referred to as Type A and Type B networks, are used as examples throughout the following description.
-
FIG. 1 illustrates, as an example, a node diagram of a Type A, non-hierarchicaldecentralized network 100. In this network structure, all nodes such as nodes N11˜Nl9 are treated as equals.FIG. 2 , on the other hand, illustrates, as an example, a node diagram of a Type B, hierarchicaldecentralized network 200. In this second network, there are regular nodes such as nodes N20˜N28, and so-called SuperNodes such as SuperNodes SN0˜SN2. Regular nodes represent computers hooked to thenetwork 200 that host or are capable of hosting files for sharing. SuperNodes are computers hooked to thenetwork 200 that not only host or are capable of hosting files for sharing, but also have higher resources than regular nodes and generally perform functions in addition to those of regular nodes. -
FIG. 3 illustrates a flow diagram of a method for performing a file or document search in a Type A, non-hierarchical decentralized network such as thenetwork 100. In 301, when a user of a node (such as node N10 inFIG. 1 ) initiates a search by generating a search (or keyword) string, the node operated by the user (hereinafter referred to as the “client node”) receives and records that search string. In some systems, the name of a file that is being requested is hashed to get a key or hash value, and the key or hash value is sent out in the search string for matching. - In 302, the client node then forwards the search string to other nodes in the decentralized network. It may do this, for example, by forwarding the search string to one or more of its neighboring nodes (i.e., nodes that it is in communication with through the decentralized network software, such as nodes N11, N12 and N13 with respect to node N10 in
FIG. 1 ), which in turn, forward the search string to their neighboring nodes (such as nodes N14, N15 and N16 with respect to node N13 inFIG. 1 ), and so on, throughout the decentralized network. Note that the precise behavior of the search string handling, forwarding and query match returning process depends on the defined rules and/or policies of the decentralized network. - Each node receiving the search string checks its file list for matches, and sends information of any query matches back through the decentralized network so as to be received by the client node in 303. Information of the query matches includes information on how to locate the file such as an URL. Hash values for each of the references (i.e., files or documents) may also be sent in the query matches. All query matches (also referred to herein as “search results”) are generally sent back along the path that they came.
- In 304, all received query matches are collated and displayed on a display screen by the client node for its user. In 305, the client node receives a selection (i.e., file or document) indicated by its user, and in 306, it manages a P2P transfer with the selected file's host node(s). For example, the client node may establish a direct connection with the node(s) having a copy of the selection available for download, and sends an HTTP request to those node(s) requesting the selection. The node(s) may then reply with a standard HTTP response.
-
FIGS. 4-5 illustrate a flow diagram of a method for performing a search query in a Type B, hierarchical decentralized network such as thenetwork 200. In particular,FIG. 4 illustrates actions taken by a client node initiating the search string (such as node N20 inFIG. 2 ), andFIG. 5 illustrates corresponding actions taken by a SuperNode (such as SuperNode SN0 connected to node N20 inFIG. 2 ) receiving the search string. - Referring now to
FIG. 4 , in 401, when a user of a node (such as node N20) initiates a search by generating a search (or keyword) string, the node operated by the user (i.e., the “client node”) receives and records that search string. In 402, the client node then forwards the search string to a SuperNode (such as SN0), which in turn, performs activities described in reference toFIG. 5 . In 403, the client node receives a prioritized list of matches back from the SuperNode and displays it on a display screen of the client node. In 404, the client node receives a selection indicated by its user, and in 405, it manages a P2P transfer with the selected file's host node(s) in much the same fashion as described in reference to 305 ofFIG. 3 . - Referring now to
FIG. 5 , in 501, a SuperNode receives and records the search string from the client node. In 502, it checks the search string against its file list, which includes files that it hosts as well as files available on other nodes connected to it (such as regular nodes N22 and N21 connected to SuperNode SN0) to generate a list of local matches. In 503, it forwards the search string to all or a subset of SuperNodes connected to it (such as SuperNodes SN1 and SN2 connected to SuperNode SN0). These SuperNodes may in turn forward the search string to other SuperNodes connected to them, and so on, wherein the number of levels the search string is forwarded depends on the defined rules and/or policies of the decentralized network. - Each of the SuperNodes receiving the search string then checks its file list for matches, and sends information of query matches (as lists of local matches) back through the decentralized network so as to be received by the original SuperNode in 504. In 505, the original SuperNode (i.e., the SuperNode first receiving the search string) then generates a list of prioritized matches from all the lists of local matches (including its own). Prioritization in this case is commonly done, for example, by connection speed and quality of the file. Finally, in 506, the prioritized list of matches is transmitted back to the client node from which the search string originated.
- Additional details on decentralized networks may be found from publicly available information for decentralized peer-to-peer technologies and protocols such as Freenet, GNUtella, and Fastrack, wherein detailed knowledge of each such decentralized network is useful in implementing the various aspects of the present invention.
- Interdiction System
-
FIG. 6 illustrates a block diagram of asystem 600 for interdicting unauthorized copying in aDecentralized Network 604. A plurality of Software Agents SA-1 to SA-N are infiltrated into theDecentralized Network 604 masquerading as nodes by following all the traditions and policies of the DecentralizedNetwork 604 so that they are virtually indistinguishable as infiltrators. - The Software Agents SA-1 to SA-N are implemented as software residing on one or more computers that communicate with nodes in the Decentralized
Network 604 through individually assigned ports of the one or more computers. IP addresses for the ports may vary with time or in some other manner so that detection of the Software Agents SA-1 to SA-N as unauthorized masqueraders of nodes in the DecentralizedNetwork 604 and their expulsion from theNetwork 604 are prevented or at least made considerably more difficult. - The Software Agents SA-1 to SA-N may uniformly infiltrate the Decentralized
Network 604 by, for example, each of the Software Agents SA-1 to SA-N connecting to a corresponding node of a representative set of nodes in the DecentralizedNetwork 604. The representative set of nodes in this case is a subset of the DecentralizedNetwork 604 from which characteristics of the entireDecentralized Network 604 may be statistically inferred. - General steps used by the Software Agents SA-1 to SA-N to infiltrate the Decentralized
Network 604 include making Internet connections to other nodes in the DecentralizedNetwork 604, performing handshakes or login procedures with those other nodes as specified by the protocol of the DecentralizedNetwork 604 in order to be recognized as nodes of the DecentralizedNetwork 604, and conducting searches and performing operations that regular nodes routinely do in the DecentralizedNetwork 604 while clandestinely also performing interdiction functions. - In addition, if the Software Agents SA-1 to SA-N are to masquerade as Supernodes in the Decentralized
Network 604, they also inform the DecentralizedNetwork 604 that they are Supernodes upon logging in and/or they are configured or at least inform the DecentralizedNetwork 604 that they are configured to meet all of the criteria for a Supernode according to the policies of the DecentralizedNetwork 604. - In order to perform the above infiltration, it is useful to first identify nodes in the Decentralized
Network 604 that the Software Agents SA-1 to SA-N can make Internet connections to. One way to do this is for a node controlled by the interdicting system to first join the DecentralizedNetwork 604 as a regular client by logging in through client application software provided by or otherwise associated with theDecentralized Network 604, receiving addresses of nodes of the DecentralizedNetwork 604 after logging in, and storing the addresses in a node address cache for later use. The node addresses may be provided in an initial list of node addresses received upon logging in, as well as additional node addresses resulting from connecting to one or more nodes in the initial list of nodes. - The number of the Software Agents SA-1 to SA-N, their attributes as reported to other nodes in the Decentralized
Network 604, and the geographical locations of the one or more computers upon which they reside are preferably determined by the number and geographical distribution of the nodes of the DecentralizedNetwork 604 so that the Software Agents SA-1 to SA-N receive a desired percentage of search related communications traveling through the DecentralizedNetwork 604. - Each of the Software Agents SA-1 to SA-N receives search queries from client nodes requesting files in the Decentralized
Network 604, and forwards those search queries to other nodes in the DecentralizedNetwork 604 so as to behave just like a regular node in this respect. When the Software Agents SA-1 to SA-N receive search results back from those forwarded search queries, however, rather than passing those search results back along the same path that the Software Agents SA-1 to SA-N received the corresponding search queries, they first send the search results to aQuery Matcher 602 implemented as software residing on a computer connected to the Software Agents SA-1 to SA-N through a private network. - The
Query Matcher 602 compares each of the references in the search results to entries in itsown Database 603 containing metadata including content identification codes of protected files. Matches are then sent back to each of the Software Agents SA-1 to SA-N for search results received by theQuery Matcher 602 from that Software Agent. - A
Central Coordinating Authority 601 implemented as software on a computer coordinates activities of the plurality of Software Agents SA-1 to SA-N so as to interdict unauthorized copying in the DecentralizedNetwork 604. It does this by sending instructions to the plurality of Software Agents SA-1 to SA-N through a private network specifying actions to be taken when the plurality of Software Agents SA-1 to SA-N receive matches of search results with protected files back from theQuery Matcher 602. - Search Result Manipulation
-
FIG. 7 illustrates a flow diagram of a method for interdicting search queries through search result manipulation. In 701, a Software Agent infiltrates a decentralized network resembling or masquerading as a node along with other Software Agents as described in reference toFIG. 6 . The node may be any node in a non-hierarchical network, or it may be a SuperNode in a hierarchical network. In 702, the Software Agent captures search results on their way back to a client node from which its corresponding search string originated. - In 703, the Software Agent identifies files, documents and/or programs that it has been chartered to protect (also referred to herein cumulatively as “protected files”) in the search results. For example, it may do this by sending the search results to a Query Matcher and receiving matches for protected files back from the Query Matcher as previously described in reference to
FIG. 6 . - In 704, the Software Agent modifies the search results so as to interdict unauthorized copying of the protected files according, for example, to instructions provided to it by a Central Coordinating Authority as previously described in reference to
FIG. 6 . In 705, the Software Agent then forwards the modified search results through the decentralized network so that it is subsequently received by the client node which originated the corresponding search string. - The Software Agent may employ any one or more of several techniques to modify the search results in 704 so as to interdict unauthorized copying in the decentralized network. In all of these techniques, however, a key feature is that none of the actual files that are residing on nodes in the decentralized network and being made available by those nodes for file sharing are damaged in any way. The techniques only interdict unauthorized copying of protected files in the decentralized network.
- One such technique to modify the search results in 704 is to simply delete all or a subset of the references that correspond to matches with protected files in the search results.
- Another technique to modify the search results in 704 is to modify information for the references corresponding to matches with protected files so that they point to, for examples, an IP address that is invalid, or an IP address for a computer that does not host the requested content, or an IP address for a computer that is not even running the client application software for the decentralized network.
- Another technique to modify the search results in 704 is to modify information for the references corresponding to matches with protected files so that they point to alternative files on their respective host nodes (i.e., nodes identified in the search results as having the protected files available for file sharing). Selection of the alternative files in this case may be made by random or non-random selection of non-protected files (i.e., files, documents or programs that the Software Agent is not chartered to protect).
- Another technique to modify the search results in 704 is to modify information for the references corresponding to matches with protected files so that they point to one or more alternative files residing on a Controlled Node. Selection of the alternative files may be made by random or non-random selection of files on a Controlled Node, as long as the alternative files being pointed to are not protected files. The Controlled Node may be a Software Agent or another node that is controlled by the
Central Coordinating Authority 601. - Since the node is controlled in this case, there is flexibility in the form and/or content of the alternative file being pointed to. For example, the alternative file may be a synthesized decoy, or another file that is freely distributable, or a rights managed version of the protected file (i.e., one that has added controls and/or features to make it compatible with a digital rights management system).
- Synthesis of Decoy Files
- Decoys are used to impersonate protected files. In particular, Decoys are files having the same properties such as filename and metadata as the files that they are impersonating, but have different content. Hash values provided by the Decoys, however, generally match their actual content, not the content of the files that they are impersonating. The following describes ways in which decoys can be algorithmically synthesized to impersonate protected audio, video, application, image and document files.
- For all file types, the title of the synthesized decoy will be a random combinatorial reordering of words and phrases from the title of the protected file. The mouse over property of the file will be the same as the title.
- For audio files, the content can be white noise or an anti-piracy message. The MIME type will be randomly selected from one of the commonly used types for audio (such as wave, or aiff). The length of the file is chosen at random from a range that corresponds to the size range of the known instances of the file on the Network.
- For video files, the content will be snow or white noise. The MIME type will be randomly selected from one of the commonly used types for video (such as mpeg, avi, or quicktime). The length of the file is also chosen at random from a range that corresponds to the size range of the known instances of the file on the Network.
- For applications, the content will be a “no operation” or NOP executable that simply terminates when executed. The type will be randomly selected from one of the commonly used types (such as ZIP).
- For image files, the content will be snow or an anti-piracy statement. The MIME type will be randomly selected from one of the commonly used types for images (such as jpg, tif, or gif). The color depth and resolution are also randomly chosen (e.g., 1600×800 resolution, 16 bit depth).
- For documents, the content is blank and the MIME type is randomly selected from one of the commonly used types for documents (such as zip, pdf, doc, ppt, rtf, or html).
- As just one example, the algorithmically synthesized decoy for a protected audio file for Madonna's Ray of Life track could include a title Ray of Life Track by Madonna. The content of the file, however, could be just white noise. The MIME type could be mp3 (or any of the common audio mime types) and the length of the audio file could be 3.5 minutes. Mouse over on the decoy would display the file title which would closely match the title of the protected file.
- In addition to, or in lieu of, modifying the search results in 704, the interdiction system of the present invention may also perform other activities for interdicting unauthorized copying in a decentralized network.
- Nodal Quarantining
- One such activity is nodal quarantining, wherein a node to be quarantined is surrounded with Software Agents by, for example, the
Central Control Authority 601. Using nodal quarantining, a node that is identified as having protected files available for file sharing can be effectively eliminated from the decentralized network by making it “invisible” to other nodes on the decentralized network or its file sharing activity restricted, but not completely eliminated, so as to interdict unauthorized copying of protected files while allowing it to share non-protected files with other nodes in the decentralized network. -
FIG. 8 illustrates a flow diagram of a method for quarantining a node, andFIGS. 9-12 illustrate a simple step-by-step example of the method using node diagrams. In 801, after identifying a node C to be quarantined, a list of its immediate neighbor nodes, N1 and N2, is obtained from that node (FIG. 9 ). In 802, a Software Agent SA1 is connected to a neighbor node N1 and the node C (FIG. 10 ). In 803, that neighbor node N1 is then disconnected from the node C (left side ofFIG. 11 ). - Depending upon the capabilities and protocol of the decentralized network, the neighbor node N1 may be disconnected using any one of numerous different techniques such as:
-
- 1) issuing a “Disconnect from node C” message to node N1, or vice versa;
- 2) issuing a “Disconnect from the Network” message to node N1;
- 3) issuing a message to node C, purporting to be from the neighbor node N1, indicating that node N1 is now disconnecting, or vice versa;
- 4) issuing a message to node N1 that violates the agreed upon connection protocol between node N1 and node C, thus inducing node N1 to abandon the connection, or vice versa;
- 5) attaching a very large number of Software Agents to node C so that its capacity or quota of immediate neighbors is exceeded, thus inducing node C to disconnect from one or more of its immediate neighbor nodes until node N1 is disconnected;
- 6) attaching a very large number of Software Agents to node C so that its capacity or quota of immediate neighbors is exceeded, thus inducing node C to transfer connections for one or more of its immediate neighbor nodes to a single neighbor node until node N1 is disconnected from node C;
- 7) overwhelming the capacity of node C's port, socket or connection to node N1 by bombarding it with messages or requests that it must parse, act upon, or otherwise process; or
- 8) eliminating or disconnecting N1 from the decentralized network altogether by exploiting a known defect in the client software application for the decentralized network or underlying client operating system running on the node N1 (e.g., overrun the stack).
- It is noted with regards to this last disconnect technique that documentation of such bugs is available in the public domain, albeit ephemerally, for most software clients of popular, large-scale distributed networks.
- In 804, the method determines whether there is a neighbor node that is still directly connected to the node to be quarantined. In this example, the answer is YES, so the method loops back to 802, and another Software Agent SA2 is connected to a neighbor node N2 and the node C (right side of
FIG. 11 ). In 803, the neighbor node N2 is then disconnected from the node to be quarantined (FIG. 12 ). Then again in 804, the method determines whether there is another neighbor node connected to the node to be quarantined. This time, however, the answer is NO, so the method terminates. - File Impersonation
- Another activity for interdicting unauthorized copying in a decentralized network is file impersonation. For example,
FIG. 13 illustrates a flow diagram of a method for interdicting unauthorized copying in a decentralized network through file impersonation. In 1301, a Software Agent infiltrates a decentralized network resembling or masquerading as a node along with other Software Agents as described in reference toFIG. 6 . The node in this case may be any type of node in either a non-hierarchical or hierarchical decentralized network. In 1302, the Software Agent receives a search string just like other nodes in the decentralized network, and in 1303, it reports matches for protected files satisfying the search string along with attributes that would qualify it as a top choice or source for the matches in the decentralized network. - In 1304, the Software Agent receives a request for one of the reported matches, and in 1305, it sends an alternative file instead of the actually requested file. The alternative file in this case may be a synthesized decoy file, or a spoof file, or a file that is freely distributable, or a rights-managed version of the matched protected file.
- File Transfer Attenuation
- Another activity for interdicting unauthorized copying in a decentralized network is file transfer attenuation. For example,
FIG. 14 illustrates a flow diagram of a method for interdicting unauthorized copying in a decentralized network through file transfer attenuation, wherein 1401˜1404 are performed in the same manner as described in reference to 1301˜1304. In 1405, however, in addition to transmitting an alternative file, the method attenuates the transmission so that its transmission rate starts off fast, then as the download goes on, the transmission rate slows down. By the time the transmission rate slows down a lot, the user of the client node requesting the file has got most of the file so he or she will be reluctant to cancel the download at that point. Eventually, however, the transmission rate will slow down to such a trickle that the user will probably become extremely unhappy with the download progress and consequently, cancel it at that point. In this case, the download will not time out so the user must explicitly cancel it in order to terminate the transmission. Alternatively, the transmission may be automatically terminated after a certain percentage such as 95% of the file has been transmitted. - Another technique for interdicting unauthorized copying in a decentralized network is hash spoofing. Although discussed separately here, forms of hash spoofing can also be used in the search results modification method described in reference to
FIG. 7 as well as the file impersonation method described in reference toFIG. 13 . - Hash Spoofing
- In most decentralized peer-to-peer file sharing networks, whether hierarchical or non-hierarchical, each unique file is given an identification code to uniquely identify its content. Commonly, this code is a hash value generated through a cryptographic hash algorithm (such as MD-4, MD-5, SHA-1, SHA-64, etc.) of all or a subset of the file's content. This hash mechanism is used by some decentralized networks to facilitate resuming downloads which have been interrupted for some reason before completion, or for multi-source downloading which can be used to greatly improve the reliability and speed of file downloads.
- A client node sends out a search string on a decentralized network, and gets search results back along with their hashes. The file that the user of the client node wishes to download, may reside on more than one node in the decentralized network as evidenced by identical hashes. If the client node has its download interrupted for some reason, it may resume its download at a later time by finding another node having the file as identified by an identical hash value, and downloading the rest of the file at that time from that node. In addition, if the client node wants to download a file with many sources on the decentralized network and it knows that all of these sources have exactly the same content (as evidenced by their same hash values), the client node can split the file content into segments and request a few segments from each of the sources.
- Once the downloads are completed, the client node then can verify that the hash given to it in the search results is identical to the hash calculated using the file content that was downloaded. If the two match, then downloading was successful. On the other hand, if they do not match, then the downloaded file is said to be corrupt, and the client node will either automatically delete it or flag it as corrupt and ask the user what to do with it.
- Hash spoofing can be used for interdicting unauthorized copying where such interruption/resumption and multi-source downloading is being used in a decentralized network. In the interdiction method described in reference to
FIG. 7 , the Software Agent may modify the search results so as to replace a link to (or address of) a file to be protected with either a link to a non-existent file along with a reported hash value that doesn't correspond to any file in the decentralized network, or a link to a spoof file along with a reported hash value matching that of the file whose link is being replaced. In the first case, the client node will try to find the non-existent file, but will be unsuccessful, because the file doesn't exist. The client node may also try to find other files with the same hash value as the non-existent file for download, but will never be able to since there are no files in the decentralized network that correspond to the hash value. - In the second case, when the Software Agent receives a request for a protected file, or a segment of the protected file in the case of a multi-source download, the spoof file or a portion thereof is transmitted instead of the requested file or segment of the file. After the client node has completed downloading the file, or all segments from its sources in the case of multi-source downloading, the hash will be calculated and a mismatch will be detected at that time (i.e., the file will be corrupted), because the hash value of the spoof file or segment thereof is different than that reported.
- Multi-Level and/or Demand Based Interdiction
- Although it is possible to perform all of the interdiction methods described herein simultaneously for maximum effect, such an approach may be an inefficient use of system resources as well as commercially impractical from a cost/benefit perspective. Further, some interdiction methods may be most advantageous under certain situations, while other interdiction methods are most advantageous in others.
- For example, one commonly used interdiction approach is to flood a decentralized network with decoys of a protected file. This approach may be very effective when there is a large demand for the protected file. However, it can also be wasteful of system resources when the demand for the protected file is small, since a large number of controlled nodes offering the decoys for downloading in the decentralized network must be provided in order to effectively flood the network with decoys, making this approach not easily scaleable.
- Conversely, some of the interdiction approaches described herein, such as search result manipulation, are readily scaleable, and therefore, are very cost effective even when demand for a protected file is small. These approaches are especially useful for protecting large catalogues of protected files where demand for individual files may vary considerably from one to another in the catalogue. Thus, a multi-level and/or demand based approach of using one or more interdiction techniques under certain circumstances, and other interdiction techniques under other circumstances can be readily appreciated for its usefulness in cost effectively interdicting unauthorized copying of protected files in a decentralized network.
-
FIG. 15 illustrates, as an example, a general approach to a multi-level and/or demand based method for interdicting unauthorized copying in a decentralized network. In 1501, a first level of interdiction is performed to interdict unauthorized copying of protected files in a decentralized network. In 1502, a trigger event is detected while performing the first level of interdiction. The trigger event may be related to a number of search results being sent back to one of the decentralized network nodes indicating a file that is to be protected through the first level of interdiction, or a number of search queries originating from the node indicating a file that is to be protected through the first level of interdiction. In 1503, a second level of interdiction is performed in response to the detection of the trigger event. The second level of interdiction may include tasks performed in addition to those of the first level of interdiction, or tasks performed in lieu of those performed in the first level of interdiction. Although only two levels of interdiction are shown in this particular example, it is to be appreciated that additional levels of interdiction could be added with each additional level being triggered by a different trigger event. -
FIG. 16 illustrates, as an example, a particular and preferred multi-level and/or demand based method for interdicting unauthorized copying in a decentralized network. In 1601, a Filterer module is run along with or as a part of a software agent masquerading as a node in the decentralized network so as to perform search result manipulation such as described in reference toFIG. 7 . - In 1602, a trigger event is detected by the software agent while performing the search result manipulation. The trigger event in this case is related to a number of times a protected file is referenced in search results being transmitted back to one of the nodes of the decentralized network. More particularly, the trigger event is detected when that number exceeds a threshold number programmed into or provided to the software agent.
- In 1603, a Flooder module included with or in the software agent is activated that causes the node identified in 1602 to be flooded with decoys of the protected file. Note that this is a selective flooding directed to a specific node of the decentralized network, as opposed to conventional flooding that is directed to the entire decentralized network. Because it is a selective or targeted flooding, as opposed to a shotgun flooding, it is to be appreciated that it is a far more efficient interdiction approach with respect to the utilization of system resources.
-
FIGS. 17 and 18 illustrate, as an example, the operation of 1601˜1603 in a hierarchical decentralized network. Referring first toFIG. 17 , a Software Agent “SNF” performs the task of a filterer such as described in reference to 1601, while masquerading as a SuperNode in the decentralized network so as to intercept communications within the decentralized network related to search queries. - During the performance of its interdiction tasks, the Software Agent “SNF” identifies references to protected files in the communications by interacting with a
Query Matcher 602 as described in reference toFIG. 6 . When the number of times that a reference to one of the protected files exceeds a threshold number for one of the other SuperNodes in the decentralized network, a trigger event is detected by the Software Agent “SNF”. In the present example, it is assumed that SuperNode “SN1” has been identified as being associated with the trigger event. - Referring now to
FIG. 18 , in response to the detection of the trigger event, a Flooder module included with or in the Software Agent “SNF” is activated. The Flooder module floods the identified SuperNode “SN1” with decoys of the protected file by, for example, connecting one or more controlled nodes, such as Controlled Node “CN4”, as regular nodes to the SuperNode “SN1”, wherein each of the controlled nodes has one or more decoys of the protected file available for downloading. Note that these nodes are referred to as controlled nodes since they are controlled by or under common control as the Software Agent “SNF”. - By continuously looping through and applying 1601˜1603, the Software Agent “SNF” can selectively flood any SuperNode in the decentralized network with decoys of any protected file in a catalog of protected files after a trigger event has identified that SuperNode and that protected file as needing the additional protection afforded by such selective flooding. Although not shown in the figures, a reverse procedure may also be used wherein selective flooding is stopped when the trigger event is no longer being triggered (i.e., when the number of times that a reference identifying the protected file and included in communications associated with a given SuperNode falls below the threshold number).
- Still other techniques for interdicting unauthorized copying in a decentralized network using the plurality of Software Agents, Central Coordinating Authority, and Query Matcher as described herein can also be readily conceived and are fully contemplated to be within the full scope of the present invention.
- Although the various aspects of the present invention have been described with respect to a preferred embodiment, it will be understood that the invention is entitled to full protection within the full scope of the appended claims.
Claims (36)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/959,345 US20050114709A1 (en) | 2003-10-25 | 2004-10-06 | Demand based method for interdiction of unauthorized copying in a decentralized network |
EP05800969A EP1810156A4 (en) | 2004-10-06 | 2005-09-30 | Demand based method for interdiction of unauthorized copying in a decentralized network |
PCT/US2005/035353 WO2006041742A2 (en) | 2004-10-06 | 2005-09-30 | Demand based method for interdiction of unauthorized copying in a decentralized network |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US51442903P | 2003-10-25 | 2003-10-25 | |
US51443003P | 2003-10-25 | 2003-10-25 | |
US51869103P | 2003-11-10 | 2003-11-10 | |
US52846603P | 2003-12-10 | 2003-12-10 | |
US10/803,784 US20050091167A1 (en) | 2003-10-25 | 2004-03-18 | Interdiction of unauthorized copying in a decentralized network |
US10/959,345 US20050114709A1 (en) | 2003-10-25 | 2004-10-06 | Demand based method for interdiction of unauthorized copying in a decentralized network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/803,784 Continuation-In-Part US20050091167A1 (en) | 2003-10-25 | 2004-03-18 | Interdiction of unauthorized copying in a decentralized network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050114709A1 true US20050114709A1 (en) | 2005-05-26 |
Family
ID=36148809
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/959,345 Abandoned US20050114709A1 (en) | 2003-10-25 | 2004-10-06 | Demand based method for interdiction of unauthorized copying in a decentralized network |
Country Status (3)
Country | Link |
---|---|
US (1) | US20050114709A1 (en) |
EP (1) | EP1810156A4 (en) |
WO (1) | WO2006041742A2 (en) |
Cited By (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040107215A1 (en) * | 2001-03-21 | 2004-06-03 | Moore James Edward | Method and apparatus for identifying electronic files |
US20050089014A1 (en) * | 2003-10-27 | 2005-04-28 | Macrovision Corporation | System and methods for communicating over the internet with geographically distributed devices of a decentralized network using transparent asymetric return paths |
US20050091167A1 (en) * | 2003-10-25 | 2005-04-28 | Macrovision Corporation | Interdiction of unauthorized copying in a decentralized network |
US20050108378A1 (en) * | 2003-10-25 | 2005-05-19 | Macrovision Corporation | Instrumentation system and methods for estimation of decentralized network characteristics |
US20050163135A1 (en) * | 2004-01-23 | 2005-07-28 | Hopkins Samuel P. | Method for improving peer to peer network communication |
US20050198535A1 (en) * | 2004-03-02 | 2005-09-08 | Macrovision Corporation, A Corporation Of Delaware | System, method and client user interface for a copy protection service |
US20050203851A1 (en) * | 2003-10-25 | 2005-09-15 | Macrovision Corporation | Corruption and its deterrence in swarm downloads of protected files in a file sharing network |
US20050216433A1 (en) * | 2003-09-19 | 2005-09-29 | Macrovision Corporation | Identification of input files using reference files associated with nodes of a sparse binary tree |
US20060010095A1 (en) * | 2004-07-09 | 2006-01-12 | Wolff Gregory J | Synchronizing distributed work through document logs |
US20060039297A1 (en) * | 2004-08-23 | 2006-02-23 | Sound Control Media Protection Limited | Data network traffic filter and method |
US20060117372A1 (en) * | 2004-01-23 | 2006-06-01 | Hopkins Samuel P | System and method for searching for specific types of people or information on a Peer-to-Peer network |
US20060253584A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Reputation of an entity associated with a content item |
US20060253580A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Website reputation product architecture |
US20060253578A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations during user interactions |
US20060253583A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations based on website handling of personal information |
US20070143405A1 (en) * | 2005-12-21 | 2007-06-21 | Macrovision Corporation | Techniques for measuring peer-to-peer (P2P) networks |
US20070192630A1 (en) * | 2005-01-24 | 2007-08-16 | Crane Stephen J | Method and apparatus for securing the privacy of sensitive information in a data-handling system |
US20070220116A1 (en) * | 2006-03-14 | 2007-09-20 | Anthony Rose | Filter for a Distributed Network |
US20070283434A1 (en) * | 2006-05-31 | 2007-12-06 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Signaling a security breach of a protected set of files |
US20070283435A1 (en) * | 2006-05-31 | 2007-12-06 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Receiving an indication of a security breach of a protected set of files |
US20070282723A1 (en) * | 2006-05-31 | 2007-12-06 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Monitoring a status of a database by placing a false identifier in the database |
US20080022400A1 (en) * | 2006-05-31 | 2008-01-24 | Searete Llc, A Limited Liablity Corporation Of The State Of Delaware | Indicating a security breach of a protected set of files |
US20080140780A1 (en) * | 2006-11-07 | 2008-06-12 | Tiversa, Inc. | System and method for enhanced experience with a peer to peer network |
US20080243688A1 (en) * | 2007-03-28 | 2008-10-02 | Hart Peter E | Method and Apparatus for Recording Transactions with a Portable Logging Device |
US20080243751A1 (en) * | 2007-03-28 | 2008-10-02 | Michael Gormish | Method and Apparatus for Recording Associations with Logs |
US20080263013A1 (en) * | 2007-04-12 | 2008-10-23 | Tiversa, Inc. | System and method for creating a list of shared information on a peer-to-peer network |
US20080319861A1 (en) * | 2007-04-12 | 2008-12-25 | Tiversa, Inc. | System and method for advertising on a peer-to-peer network |
US20090222528A1 (en) * | 2008-02-29 | 2009-09-03 | Samsung Electronics Co., Ltd. | Resource sharing method and system |
US20090276522A1 (en) * | 2008-04-30 | 2009-11-05 | Seidel Craig H | Cooperative monitoring of peer-to-peer network activity |
US20100042931A1 (en) * | 2005-05-03 | 2010-02-18 | Christopher John Dixon | Indicating website reputations during website manipulation of user information |
US20100088512A1 (en) * | 2008-10-02 | 2010-04-08 | Schwartz Edward L | Method and Apparatus for Automatically Publishing Content Based Identifiers |
US7809943B2 (en) | 2005-09-27 | 2010-10-05 | Rovi Solutions Corporation | Method and system for establishing trust in a peer-to-peer network |
US8006094B2 (en) | 2007-02-21 | 2011-08-23 | Ricoh Co., Ltd. | Trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes |
US20120166541A1 (en) * | 2010-06-08 | 2012-06-28 | Trident Media Guard Tmg | Systems and methods for collecting information over a peer to peer network |
US8479004B2 (en) | 2006-08-31 | 2013-07-02 | Ricoh Co., Ltd | Paper-based document logging |
US8701196B2 (en) | 2006-03-31 | 2014-04-15 | Mcafee, Inc. | System, method and computer program product for obtaining a reputation associated with a file |
US9152808B1 (en) * | 2013-03-25 | 2015-10-06 | Amazon Technologies, Inc. | Adapting decoy data present in a network |
US9521128B2 (en) | 2014-11-07 | 2016-12-13 | Qualcomm Incorporated | Using a hash of a filename to control encoding/decoding of a digital file |
US9792269B2 (en) | 2002-07-19 | 2017-10-17 | Open Invention Network, Llc | Registry driven interoperability and exchange of documents |
US9876798B1 (en) * | 2014-03-31 | 2018-01-23 | Google Llc | Replacing unauthorized media items with authorized media items across platforms |
US10834051B2 (en) | 2013-04-08 | 2020-11-10 | Amazon Technologies, Inc. | Proxy server-based malware detection |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5437050A (en) * | 1992-11-09 | 1995-07-25 | Lamb; Robert G. | Method and apparatus for recognizing broadcast information using multi-frequency magnitude detection |
US5918223A (en) * | 1996-07-22 | 1999-06-29 | Muscle Fish | Method and article of manufacture for content-based analysis, storage, retrieval, and segmentation of audio information |
US5925843A (en) * | 1997-02-12 | 1999-07-20 | Virtual Music Entertainment, Inc. | Song identification and synchronization |
US5978791A (en) * | 1995-04-11 | 1999-11-02 | Kinetech, Inc. | Data processing system using substantially unique identifiers to identify data items, whereby identical data items have the same identifiers |
US6188010B1 (en) * | 1999-10-29 | 2001-02-13 | Sony Corporation | Music search by melody input |
US20020143894A1 (en) * | 2001-03-30 | 2002-10-03 | Kabushiki Kaisha Toshiba | Data providing apparatus and data providing method |
US20020141387A1 (en) * | 2001-04-03 | 2002-10-03 | David Orshan | System, method and computer program product for delivery of internet services from a central system to multiple internet service providers at guaranteed service levels |
US20020152261A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
US20020152262A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
US20020174216A1 (en) * | 2001-05-17 | 2002-11-21 | International Business Machines Corporation | Internet traffic analysis tool |
US20030023421A1 (en) * | 1999-08-07 | 2003-01-30 | Sibelius Software, Ltd. | Music database searching |
US20030028889A1 (en) * | 2001-08-03 | 2003-02-06 | Mccoskey John S. | Video and digital multimedia aggregator |
US20030093794A1 (en) * | 2001-11-13 | 2003-05-15 | Koninklijke Philips Electronics N.V. | Method and system for personal information retrieval, update and presentation |
US6678680B1 (en) * | 2000-01-06 | 2004-01-13 | Mark Woo | Music search engine |
US6732180B1 (en) * | 2000-08-08 | 2004-05-04 | The University Of Tulsa | Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network |
US20040093354A1 (en) * | 2001-03-23 | 2004-05-13 | Changsheng Xu | Method and system of representing musical information in a digital representation for use in content-based multimedia information retrieval |
US20040107215A1 (en) * | 2001-03-21 | 2004-06-03 | Moore James Edward | Method and apparatus for identifying electronic files |
US20050091167A1 (en) * | 2003-10-25 | 2005-04-28 | Macrovision Corporation | Interdiction of unauthorized copying in a decentralized network |
US20050089014A1 (en) * | 2003-10-27 | 2005-04-28 | Macrovision Corporation | System and methods for communicating over the internet with geographically distributed devices of a decentralized network using transparent asymetric return paths |
US20050108378A1 (en) * | 2003-10-25 | 2005-05-19 | Macrovision Corporation | Instrumentation system and methods for estimation of decentralized network characteristics |
US20050198535A1 (en) * | 2004-03-02 | 2005-09-08 | Macrovision Corporation, A Corporation Of Delaware | System, method and client user interface for a copy protection service |
US20050203851A1 (en) * | 2003-10-25 | 2005-09-15 | Macrovision Corporation | Corruption and its deterrence in swarm downloads of protected files in a file sharing network |
US20050216433A1 (en) * | 2003-09-19 | 2005-09-29 | Macrovision Corporation | Identification of input files using reference files associated with nodes of a sparse binary tree |
-
2004
- 2004-10-06 US US10/959,345 patent/US20050114709A1/en not_active Abandoned
-
2005
- 2005-09-30 EP EP05800969A patent/EP1810156A4/en not_active Withdrawn
- 2005-09-30 WO PCT/US2005/035353 patent/WO2006041742A2/en active Application Filing
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5437050A (en) * | 1992-11-09 | 1995-07-25 | Lamb; Robert G. | Method and apparatus for recognizing broadcast information using multi-frequency magnitude detection |
US5978791A (en) * | 1995-04-11 | 1999-11-02 | Kinetech, Inc. | Data processing system using substantially unique identifiers to identify data items, whereby identical data items have the same identifiers |
US5918223A (en) * | 1996-07-22 | 1999-06-29 | Muscle Fish | Method and article of manufacture for content-based analysis, storage, retrieval, and segmentation of audio information |
US5925843A (en) * | 1997-02-12 | 1999-07-20 | Virtual Music Entertainment, Inc. | Song identification and synchronization |
US20030023421A1 (en) * | 1999-08-07 | 2003-01-30 | Sibelius Software, Ltd. | Music database searching |
US6188010B1 (en) * | 1999-10-29 | 2001-02-13 | Sony Corporation | Music search by melody input |
US6678680B1 (en) * | 2000-01-06 | 2004-01-13 | Mark Woo | Music search engine |
US20040030691A1 (en) * | 2000-01-06 | 2004-02-12 | Mark Woo | Music search engine |
US6732180B1 (en) * | 2000-08-08 | 2004-05-04 | The University Of Tulsa | Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network |
US20040107215A1 (en) * | 2001-03-21 | 2004-06-03 | Moore James Edward | Method and apparatus for identifying electronic files |
US20040093354A1 (en) * | 2001-03-23 | 2004-05-13 | Changsheng Xu | Method and system of representing musical information in a digital representation for use in content-based multimedia information retrieval |
US20020143894A1 (en) * | 2001-03-30 | 2002-10-03 | Kabushiki Kaisha Toshiba | Data providing apparatus and data providing method |
US20020141387A1 (en) * | 2001-04-03 | 2002-10-03 | David Orshan | System, method and computer program product for delivery of internet services from a central system to multiple internet service providers at guaranteed service levels |
US20020152261A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
US20020152262A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
US20020174216A1 (en) * | 2001-05-17 | 2002-11-21 | International Business Machines Corporation | Internet traffic analysis tool |
US20030028889A1 (en) * | 2001-08-03 | 2003-02-06 | Mccoskey John S. | Video and digital multimedia aggregator |
US20030093794A1 (en) * | 2001-11-13 | 2003-05-15 | Koninklijke Philips Electronics N.V. | Method and system for personal information retrieval, update and presentation |
US20050216433A1 (en) * | 2003-09-19 | 2005-09-29 | Macrovision Corporation | Identification of input files using reference files associated with nodes of a sparse binary tree |
US20050091167A1 (en) * | 2003-10-25 | 2005-04-28 | Macrovision Corporation | Interdiction of unauthorized copying in a decentralized network |
US20050108378A1 (en) * | 2003-10-25 | 2005-05-19 | Macrovision Corporation | Instrumentation system and methods for estimation of decentralized network characteristics |
US20050203851A1 (en) * | 2003-10-25 | 2005-09-15 | Macrovision Corporation | Corruption and its deterrence in swarm downloads of protected files in a file sharing network |
US20050089014A1 (en) * | 2003-10-27 | 2005-04-28 | Macrovision Corporation | System and methods for communicating over the internet with geographically distributed devices of a decentralized network using transparent asymetric return paths |
US20050198535A1 (en) * | 2004-03-02 | 2005-09-08 | Macrovision Corporation, A Corporation Of Delaware | System, method and client user interface for a copy protection service |
Cited By (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040107215A1 (en) * | 2001-03-21 | 2004-06-03 | Moore James Edward | Method and apparatus for identifying electronic files |
US9792269B2 (en) | 2002-07-19 | 2017-10-17 | Open Invention Network, Llc | Registry driven interoperability and exchange of documents |
US20050216433A1 (en) * | 2003-09-19 | 2005-09-29 | Macrovision Corporation | Identification of input files using reference files associated with nodes of a sparse binary tree |
US7715934B2 (en) | 2003-09-19 | 2010-05-11 | Macrovision Corporation | Identification of input files using reference files associated with nodes of a sparse binary tree |
US20050091167A1 (en) * | 2003-10-25 | 2005-04-28 | Macrovision Corporation | Interdiction of unauthorized copying in a decentralized network |
US20050108378A1 (en) * | 2003-10-25 | 2005-05-19 | Macrovision Corporation | Instrumentation system and methods for estimation of decentralized network characteristics |
US20050203851A1 (en) * | 2003-10-25 | 2005-09-15 | Macrovision Corporation | Corruption and its deterrence in swarm downloads of protected files in a file sharing network |
US20050089014A1 (en) * | 2003-10-27 | 2005-04-28 | Macrovision Corporation | System and methods for communicating over the internet with geographically distributed devices of a decentralized network using transparent asymetric return paths |
US20100042732A1 (en) * | 2004-01-23 | 2010-02-18 | Hopkins Samuel P | Method for improving peer to peer network communication |
US8798016B2 (en) | 2004-01-23 | 2014-08-05 | Tiversa Ip, Inc. | Method for improving peer to peer network communication |
US7783749B2 (en) | 2004-01-23 | 2010-08-24 | Tiversa, Inc. | Method for monitoring and providing information over a peer to peer network |
US20060117372A1 (en) * | 2004-01-23 | 2006-06-01 | Hopkins Samuel P | System and method for searching for specific types of people or information on a Peer-to-Peer network |
US20050163050A1 (en) * | 2004-01-23 | 2005-07-28 | Hopkins Samuel P. | Method for monitoring and providing information over a peer to peer network |
US9300534B2 (en) | 2004-01-23 | 2016-03-29 | Tiversa Ip, Inc. | Method for optimally utilizing a peer to peer network |
US8972585B2 (en) | 2004-01-23 | 2015-03-03 | Tiversa Ip, Inc. | Method for splitting a load of monitoring a peer to peer network |
US8904015B2 (en) | 2004-01-23 | 2014-12-02 | Tiversa Ip, Inc. | Method for optimally utilizing a peer to peer network |
US8037176B2 (en) | 2004-01-23 | 2011-10-11 | Tiversa, Inc. | Method for monitoring and providing information over a peer to peer network |
US20070153710A1 (en) * | 2004-01-23 | 2007-07-05 | Tiversa, Inc. | Method for monitoring and providing information over a peer to peer network |
US20110029660A1 (en) * | 2004-01-23 | 2011-02-03 | Tiversa, Inc. | Method for monitoring and providing information over a peer to peer network |
US8819237B2 (en) | 2004-01-23 | 2014-08-26 | Tiversa Ip, Inc. | Method for monitoring and providing information over a peer to peer network |
US7761569B2 (en) | 2004-01-23 | 2010-07-20 | Tiversa, Inc. | Method for monitoring and providing information over a peer to peer network |
US8095614B2 (en) | 2004-01-23 | 2012-01-10 | Tiversa, Inc. | Method for optimally utilizing a peer to peer network |
US8769115B2 (en) | 2004-01-23 | 2014-07-01 | Tiversa Ip, Inc. | Method and apparatus for optimally utilizing a peer to peer network node by enforcing connection time limits |
US8468250B2 (en) | 2004-01-23 | 2013-06-18 | Tiversa Ip, Inc. | Method for monitoring and providing information over a peer to peer network |
US7583682B2 (en) | 2004-01-23 | 2009-09-01 | Tiversa, Inc. | Method for improving peer to peer network communication |
US8386613B2 (en) | 2004-01-23 | 2013-02-26 | Tiversa Ip, Inc. | Method for monitoring and providing information over a peer to peer network |
US20050163135A1 (en) * | 2004-01-23 | 2005-07-28 | Hopkins Samuel P. | Method for improving peer to peer network communication |
US8358641B2 (en) | 2004-01-23 | 2013-01-22 | Tiversa Ip, Inc. | Method for improving peer to peer network communication |
US8312080B2 (en) | 2004-01-23 | 2012-11-13 | Tiversa Ip, Inc. | System and method for searching for specific types of people or information on a peer to-peer network |
US8156175B2 (en) | 2004-01-23 | 2012-04-10 | Tiversa Inc. | System and method for searching for specific types of people or information on a peer-to-peer network |
US8122133B2 (en) | 2004-01-23 | 2012-02-21 | Tiversa, Inc. | Method for monitoring and providing information over a peer to peer network |
US20050198535A1 (en) * | 2004-03-02 | 2005-09-08 | Macrovision Corporation, A Corporation Of Delaware | System, method and client user interface for a copy protection service |
US7877810B2 (en) | 2004-03-02 | 2011-01-25 | Rovi Solutions Corporation | System, method and client user interface for a copy protection service |
US20070219942A1 (en) * | 2004-07-09 | 2007-09-20 | Wolff Gregory J | Synchronizing distributed work through document logs |
US7949666B2 (en) | 2004-07-09 | 2011-05-24 | Ricoh, Ltd. | Synchronizing distributed work through document logs |
US20070288441A1 (en) * | 2004-07-09 | 2007-12-13 | Wolff Gregory J | Synchronizing distributed work through document logs |
US8903788B2 (en) * | 2004-07-09 | 2014-12-02 | Ricoh Co., Ltd. | Synchronizing distributed work through document logs |
US20060010095A1 (en) * | 2004-07-09 | 2006-01-12 | Wolff Gregory J | Synchronizing distributed work through document logs |
US20060039297A1 (en) * | 2004-08-23 | 2006-02-23 | Sound Control Media Protection Limited | Data network traffic filter and method |
US8046592B2 (en) * | 2005-01-24 | 2011-10-25 | Hewlett-Packard Development Company, L.P. | Method and apparatus for securing the privacy of sensitive information in a data-handling system |
US20070192630A1 (en) * | 2005-01-24 | 2007-08-16 | Crane Stephen J | Method and apparatus for securing the privacy of sensitive information in a data-handling system |
US20080109473A1 (en) * | 2005-05-03 | 2008-05-08 | Dixon Christopher J | System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface |
US8429545B2 (en) | 2005-05-03 | 2013-04-23 | Mcafee, Inc. | System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface |
US8566726B2 (en) | 2005-05-03 | 2013-10-22 | Mcafee, Inc. | Indicating website reputations based on website handling of personal information |
US20060253584A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Reputation of an entity associated with a content item |
US20100042931A1 (en) * | 2005-05-03 | 2010-02-18 | Christopher John Dixon | Indicating website reputations during website manipulation of user information |
US20060253580A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Website reputation product architecture |
US8438499B2 (en) | 2005-05-03 | 2013-05-07 | Mcafee, Inc. | Indicating website reputations during user interactions |
US20060253578A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations during user interactions |
US20060253583A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations based on website handling of personal information |
US8516377B2 (en) | 2005-05-03 | 2013-08-20 | Mcafee, Inc. | Indicating Website reputations during Website manipulation of user information |
US8321791B2 (en) | 2005-05-03 | 2012-11-27 | Mcafee, Inc. | Indicating website reputations during website manipulation of user information |
US8826155B2 (en) | 2005-05-03 | 2014-09-02 | Mcafee, Inc. | System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface |
US8826154B2 (en) | 2005-05-03 | 2014-09-02 | Mcafee, Inc. | System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface |
US8296664B2 (en) | 2005-05-03 | 2012-10-23 | Mcafee, Inc. | System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface |
US20080114709A1 (en) * | 2005-05-03 | 2008-05-15 | Dixon Christopher J | System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface |
US7809943B2 (en) | 2005-09-27 | 2010-10-05 | Rovi Solutions Corporation | Method and system for establishing trust in a peer-to-peer network |
US8086722B2 (en) | 2005-12-21 | 2011-12-27 | Rovi Solutions Corporation | Techniques for measuring peer-to-peer (P2P) networks |
US20070143405A1 (en) * | 2005-12-21 | 2007-06-21 | Macrovision Corporation | Techniques for measuring peer-to-peer (P2P) networks |
US8671188B2 (en) | 2005-12-21 | 2014-03-11 | Rovi Solutions Corporation | Techniques for measuring peer-to-peer (P2P) networks |
US20070220116A1 (en) * | 2006-03-14 | 2007-09-20 | Anthony Rose | Filter for a Distributed Network |
US20120209966A1 (en) * | 2006-03-14 | 2012-08-16 | Altnet, Inc. | Filter for a distributed network |
US8185576B2 (en) * | 2006-03-14 | 2012-05-22 | Altnet, Inc. | Filter for a distributed network |
US8775508B2 (en) * | 2006-03-14 | 2014-07-08 | Altnet, Inc. | Filter for a distributed network |
US9098683B2 (en) | 2006-03-14 | 2015-08-04 | Global File Systems Holdings, Llc | Filter for a distributed network |
US8701196B2 (en) | 2006-03-31 | 2014-04-15 | Mcafee, Inc. | System, method and computer program product for obtaining a reputation associated with a file |
US8191140B2 (en) | 2006-05-31 | 2012-05-29 | The Invention Science Fund I, Llc | Indicating a security breach of a protected set of files |
US20070283434A1 (en) * | 2006-05-31 | 2007-12-06 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Signaling a security breach of a protected set of files |
US20080022400A1 (en) * | 2006-05-31 | 2008-01-24 | Searete Llc, A Limited Liablity Corporation Of The State Of Delaware | Indicating a security breach of a protected set of files |
US20070282723A1 (en) * | 2006-05-31 | 2007-12-06 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Monitoring a status of a database by placing a false identifier in the database |
US20070283435A1 (en) * | 2006-05-31 | 2007-12-06 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Receiving an indication of a security breach of a protected set of files |
US8209755B2 (en) * | 2006-05-31 | 2012-06-26 | The Invention Science Fund I, Llc | Signaling a security breach of a protected set of files |
US8640247B2 (en) | 2006-05-31 | 2014-01-28 | The Invention Science Fund I, Llc | Receiving an indication of a security breach of a protected set of files |
US8479004B2 (en) | 2006-08-31 | 2013-07-02 | Ricoh Co., Ltd | Paper-based document logging |
JP2010509674A (en) * | 2006-11-07 | 2010-03-25 | タイヴァーサ・インコーポレーテッド | System and method for enhancing behavior in a peer-to-peer network |
US20080140780A1 (en) * | 2006-11-07 | 2008-06-12 | Tiversa, Inc. | System and method for enhanced experience with a peer to peer network |
JP2013149275A (en) * | 2006-11-07 | 2013-08-01 | Tiversa Inc | System and method for enhancement of behavior in peer-to-peer network |
US20150334180A1 (en) * | 2006-11-07 | 2015-11-19 | Tiversa Ip, Inc. | System and method for enhanced experience with a peer-to-peer network |
US9021026B2 (en) * | 2006-11-07 | 2015-04-28 | Tiversa Ip, Inc. | System and method for enhanced experience with a peer to peer network |
US8006094B2 (en) | 2007-02-21 | 2011-08-23 | Ricoh Co., Ltd. | Trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes |
US8412946B2 (en) | 2007-02-21 | 2013-04-02 | Ricoh Co., Ltd. | Trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes |
US8996483B2 (en) | 2007-03-28 | 2015-03-31 | Ricoh Co., Ltd. | Method and apparatus for recording associations with logs |
US20080243688A1 (en) * | 2007-03-28 | 2008-10-02 | Hart Peter E | Method and Apparatus for Recording Transactions with a Portable Logging Device |
US20080243751A1 (en) * | 2007-03-28 | 2008-10-02 | Michael Gormish | Method and Apparatus for Recording Associations with Logs |
US20080319861A1 (en) * | 2007-04-12 | 2008-12-25 | Tiversa, Inc. | System and method for advertising on a peer-to-peer network |
US20080263013A1 (en) * | 2007-04-12 | 2008-10-23 | Tiversa, Inc. | System and method for creating a list of shared information on a peer-to-peer network |
US9922330B2 (en) | 2007-04-12 | 2018-03-20 | Kroll Information Assurance, Llc | System and method for advertising on a peer-to-peer network |
US8909664B2 (en) | 2007-04-12 | 2014-12-09 | Tiversa Ip, Inc. | System and method for creating a list of shared information on a peer-to-peer network |
US20090222528A1 (en) * | 2008-02-29 | 2009-09-03 | Samsung Electronics Co., Ltd. | Resource sharing method and system |
US9098518B2 (en) * | 2008-02-29 | 2015-08-04 | Samsung Electronics Co., Ltd. | Resource sharing method and system |
US8015283B2 (en) * | 2008-04-30 | 2011-09-06 | Motion Picture Laboratories, Inc. | Cooperative monitoring of peer-to-peer network activity |
US20090276522A1 (en) * | 2008-04-30 | 2009-11-05 | Seidel Craig H | Cooperative monitoring of peer-to-peer network activity |
US8185733B2 (en) | 2008-10-02 | 2012-05-22 | Ricoh Co., Ltd. | Method and apparatus for automatically publishing content based identifiers |
US20100088512A1 (en) * | 2008-10-02 | 2010-04-08 | Schwartz Edward L | Method and Apparatus for Automatically Publishing Content Based Identifiers |
US20120166541A1 (en) * | 2010-06-08 | 2012-06-28 | Trident Media Guard Tmg | Systems and methods for collecting information over a peer to peer network |
US20160019395A1 (en) * | 2013-03-25 | 2016-01-21 | Amazon Technologies, Inc. | Adapting decoy data present in a network |
US9152808B1 (en) * | 2013-03-25 | 2015-10-06 | Amazon Technologies, Inc. | Adapting decoy data present in a network |
US9990507B2 (en) * | 2013-03-25 | 2018-06-05 | Amazon Technologies, Inc. | Adapting decoy data present in a network |
US10834051B2 (en) | 2013-04-08 | 2020-11-10 | Amazon Technologies, Inc. | Proxy server-based malware detection |
US9876798B1 (en) * | 2014-03-31 | 2018-01-23 | Google Llc | Replacing unauthorized media items with authorized media items across platforms |
US10432633B1 (en) | 2014-03-31 | 2019-10-01 | Google Llc | Replacing unauthorized media items with authorized media items across platforms |
US9521128B2 (en) | 2014-11-07 | 2016-12-13 | Qualcomm Incorporated | Using a hash of a filename to control encoding/decoding of a digital file |
Also Published As
Publication number | Publication date |
---|---|
WO2006041742A2 (en) | 2006-04-20 |
EP1810156A4 (en) | 2012-07-25 |
EP1810156A2 (en) | 2007-07-25 |
WO2006041742A3 (en) | 2007-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050114709A1 (en) | Demand based method for interdiction of unauthorized copying in a decentralized network | |
US20050091167A1 (en) | Interdiction of unauthorized copying in a decentralized network | |
US20220407933A1 (en) | Locality based content distribution | |
US8775562B2 (en) | Mapping file fragments to file information and tagging in a segmented file sharing system | |
US20050203851A1 (en) | Corruption and its deterrence in swarm downloads of protected files in a file sharing network | |
US20100169195A1 (en) | Preventing unauthorized distribution of content on computer networks | |
KR20080047353A (en) | Distributed caching of files in a network | |
AU2008287031B2 (en) | A method and system for tracking and optimizing advertisements on a decentralized network | |
Verma | Legitimate applications of peer-to-peer networks | |
Yang et al. | A survey of peer-to-peer attacks and counter attacks | |
Saroliya et al. | A pragmatic analysis of peer to peer networks and protocols for security and confidentiality | |
Lee et al. | Advanced node insertion attack with availability falsification in Kademlia-based P2P networks | |
AU2012202691A1 (en) | A method and system for tracking and optimizing advertisements on a decentralized network | |
JP5554766B2 (en) | System for identifying the presence of a P2P network software application | |
WO2005045624A2 (en) | Method of protecting copyrighted digital files in a distributed file sharing network | |
Robles et al. | A paradigm solution to P2P security issues | |
Xin et al. | Automatic patching based on social computing in P2P network | |
Balachandran | A study of protocols for secure peer to peer networks | |
Ookita et al. | Index Poisoning Scheme for P2P File Sharing Systems with Low Spatial and Network Costs (Preliminary Version) | |
US20110035509A1 (en) | System and Method for High Speed transfer of Files over a Network | |
GB2489936A (en) | Preventing cyber attack damage by reloading a copy of a master copy of an operating system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MACROVISION CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOORE, JAMES;REEL/FRAME:015606/0028 Effective date: 20050111 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:APTIV DIGITAL, INC.;GEMSTAR DEVELOPMENT CORPORATION;GEMSTAR-TV GUIDE INTERNATIONAL, INC.;AND OTHERS;REEL/FRAME:020986/0074 Effective date: 20080502 Owner name: JPMORGAN CHASE BANK, N.A.,NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:APTIV DIGITAL, INC.;GEMSTAR DEVELOPMENT CORPORATION;GEMSTAR-TV GUIDE INTERNATIONAL, INC.;AND OTHERS;REEL/FRAME:020986/0074 Effective date: 20080502 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: ALL MEDIA GUIDE, LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: ROVI SOLUTIONS CORPORATION (FORMERLY KNOWN AS MACR Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: ROVI TECHNOLOGIES CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: APTIV DIGITAL, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: ROVI GUIDES, INC. (FORMERLY KNOWN AS GEMSTAR-TV GU Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: INDEX SYSTEMS INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: STARSIGHT TELECAST, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: UNITED VIDEO PROPERTIES, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: ROVI DATA SOLUTIONS, INC. (FORMERLY KNOWN AS TV GU Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: TV GUIDE, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: ODS PROPERTIES, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: GEMSTAR DEVELOPMENT CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: TV GUIDE ONLINE, LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 Owner name: ROVI SOLUTIONS LIMITED (FORMERLY KNOWN AS MACROVIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (A NATIONAL ASSOCIATION);REEL/FRAME:025222/0731 Effective date: 20100317 |